Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Amazon Web Services CLF-C02 - AWS Certified Cloud Practitioner

Page: 3 / 14
Total 881 questions

A company is running a key-value NoSQL workload on Amazon EC2 instances. The company needs the workload to have scalability, failover protection, and backup capabilities.

What is the MOST operationally efficient way to meet these requirements?

A.

Add additional EC2 instances to the database cluster.

B.

Run an identical copy of the database in a second Availability Zone.

C.

Migrate the database to Amazon DynamoDB.

D.

Migrate the database to a relational database.

Treating infrastructure as code in the AWS Cloud allows users to:

A.

automate migration of on-premises hardware to AWS data centers.

B.

let a third party automate an audit of the AWS infrastructure.

C.

turn over application code to AWS so it can run on the AWS infrastructure.

D.

automate the infrastructure provisioning process.

Which design principle aligns with performance efficiency pillar of the AWS Well-Architected Framework?

A.

Using serverless architectures

B.

Scaling horizontally

C.

Measuring the cost of workloads

D.

Using managed services

Which of the following are features of network ACLs as they are used in the AWS Cloud? (Select TWO.)

A.

They are stateless.

B.

They are stateful.

C.

They evaluate all rules before allowing traffic.

D.

They process rules in order, starting with the lowest numbered rule, when deciding whether to allow traffic.

E.

They operate at the instance level.

A company is creating a web application that requires a relational database to store customer data. Which AWS service should the company use to host the database?

A.

Amazon Aurora

B.

Amazon DynamoDB

C.

Amazon ElastiCache

D.

Amazon Redshift

A company needs to invoke an AWS Step Functions workflow each time an Amazon EC2 instance state changes to RUNNING.

Which AWS service can the company use to meet this requirement?

A.

Amazon SageMaker

B.

Amazon Connect

C.

Amazon EventBridge

D.

AWS Fargate

A cloud practitioner wants a repeatable way to deploy identical AWS resources by using infrastructure templates. Which AWS service will meet these requirements?

A.

AWS CloudFormation

B.

AWS Directory Service

C.

Amazon Lightsail

D.

AWS CodeDeploy

Which AWS service gives users on-demand, sell-service access to AWS compliance control reports?

A.

AWS Config

B.

Amazon GuardDuty

C.

AWS Trusted Advisor

D.

AWS Artifact

Which action should a company take to improve security in its AWS account?

A.

Require multi-factor authentication (MFA) for privileged users.

B.

Remove the root user account.

C.

Create an access key for the AWS account root user.

D.

Create an access key for each privileged user.

A company is designing AWS architecture that will add compute resources when the company needs them. The architecture also includes a disaster recovery plan with automatic failover.

A.

Reliability

B.

Operational excellence

C.

Security

D.

Performance efficiency

Which AWS service can be used to encrypt data at rest?

A.

Amazon GuardDuty

B.

AWS Shield

C.

AWS Security Hub

D.

AWS Key Management Service (AWS KMS)

A company needs to automatically protect its Amazon EC2 instances from distributed denial of service (DDoS) attacks.

A.

Network access control list (ACL)

B.

AWS Shield

C.

Security group

D.

Amazon GuardDuty

A company needs to establish a dedicated network connection from on premises to AWS. The connection must provide consistent, low-latency network performance.

Which AWS service should the company use to meet this requirement?

A.

AWS Direct Connect

B.

AWS Site-to-Site VPN

C.

AWS Directory Service

D.

AWS Transit Gateway

A developer needs to use a standardized template to create copies of a company's AWS architecture for development test, and production environments. Which AWS service should the developer use to meet this requirement?

A.

AWS Cloud Map

B.

AWS Cloud Formation

C.

Amazon CloudFront

D.

AWS CloudTrail

A company is building a business intelligence solution that uses Amazon Redshift. The company wants to use an AWS service to create interactive dashboards and not pay any upfront costs for it.

Which service should the company use?

A.

Amazon CloudWatch

B.

AWS Health Dashboard

C.

AWS Service Catalog

D.

Amazon QuickSight

Which design principles are included in the reliability pillar of the AWS Well-Architected Framework? (Select TWO.)

A.

Automatically recover from failure.

B.

Grant everyone access to increase AWS service quotas.

C.

Stop guessing capacity.

D.

Design applications to run in a single Availability Zone.

E.

Plan to increase AWS service quotas first in a secondary AWS Region.

A company is building AWS architecture to deliver real-time data feeds from an on-premises data center into an application that runs on AWS. The company needs a consistent network connection with minimal latency.

What should the company use to connect the application and the data center to meet these requirements?

A.

AWS Direct Connect

B.

Public internet

C.

AWS VPN

D.

Amazon Connect

A company wants to host an application on Amazon EC2 instances. The company needs to bring its own license for its operating systems. To meet governance and compliance requirements, the application needs software licensing at the physical server level.

Which EC2 instance purchasing option will meet these requirements?

A.

Reserved Instances

B.

Spot Instances

C.

On-Demand Instances

D.

Dedicated Hosts

A company will run a predictable compute workload on Amazon EC2 Instances for the next 3 years. The workload is critical for the company. The company wants to optimize costs to run the workload.

Which solution will meet these requirements?

A.

Spot Instances

B.

Dedicated Hosts

C.

Savings Plans

D.

On-Demand Instances

A company wants to centrally manage Its employee's access to multiple AWS accounts.

Which AWS service or feature should the company use to meet this requirement?

A.

AWS Identity and Access Management Access Analyzer

B.

AWS Secrets Manager

C.

AWS IAM Identity Center

D.

AWS Security Token Service (AWS STS)